Publication | Closed Access
An approach for analysing the propagation of data errors in software
89
Citations
20
References
2002
Year
Unknown Venue
Software MaintenanceSoftware Reliability TestingEngineeringVerificationSoftware EngineeringEmbedded SystemsFormal VerificationSoftware AnalysisHardware SecurityReliability EngineeringData ErrorsFault AnalysisSystems EngineeringFailure DetectionError PermeabilitySoftware System SafetySoftware ValidationComputer EngineeringComputer ScienceStatic Program AnalysisSoftware DesignSoftware VerificationError Detection MechanismsProgram AnalysisSoftware TestingFormal MethodsFault InjectionSystem Software
The study proposes a novel framework to analyse data‑error propagation in software and identify modules most vulnerable to error spread. The framework defines error permeability and related metrics, estimates them through fault injection, and uses them to pinpoint optimal placements for error detection and recovery mechanisms in embedded software. Experiments on a real embedded control system demonstrate that the framework effectively identifies error‑propagation patterns and guides the placement of error detection and recovery mechanisms.
We present a novel approach for analysing the propagation of data errors in software. The concept of error permeability is introduced as a basic measure upon which we define a set of related measures. These measures guide us in the process of analysing the vulnerability of software to find the modules that are most likely exposed to propagating errors. Based on the analysis performed with error permeability and its related measures, we describe how to select suitable locations for error detection mechanisms (EDMs) and error recovery mechanisms (ERMs). A method for experimental estimation of error permeability, based on fault injection, is described and the software of a real embedded control system analysed to show the type of results obtainable by the analysis framework. The results show that the developed framework is very useful for analysing error propagation and software vulnerability and for deciding where to place EDMs and ERMs.
| Year | Citations | |
|---|---|---|
Page 1
Page 1